Applied cryptology, cryptographic protocols, and computer security models. [electronic resource]

Contributor(s): DeMillo, Richard A | American Mathematical SocietyMaterial type: TextTextSeries: Proceedings of symposia in applied mathematics ; v. 29. | Proceedings of symposia in applied mathematics. AMS short course lecture notes.Publication details: Providence, R.I. : American Mathematical Society, c1983Description: 1 online resource (xi, 192 p. : ill.)ISBN: 9780821892442 (online)Subject(s): Computers -- Access control | CryptographyAdditional physical formats: Applied cryptology, cryptographic protocols, and computer security models.DDC classification: 001.64 LOC classification: QA76.9.A25 | A66 1983Online resources: Contents | Contents
Contents:
Introduction / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- http://www.ams.org/psapm/029 http://dx.doi.org/10.1090/psapm/029/9880 Cryptography / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- http://www.ams.org/psapm/029 http://dx.doi.org/10.1090/psapm/029/9879 Computer System Security Models / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- http://www.ams.org/psapm/029 http://dx.doi.org/10.1090/psapm/029/9878 Protocols and Security / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- http://www.ams.org/psapm/029 http://dx.doi.org/10.1090/psapm/029/9877
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK12296

Expanded version of notes prepared for the AMS short course entitled Cryptology in revolution, mathematics and models, held in San Francisco, Calif., Jan. 5-6, 1981, by Richard A. DeMillo and others.

Bibliography: p. 187-192.

Introduction / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- Cryptography / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- Computer System Security Models / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- Protocols and Security / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton --

http://www.ams.org/psapm/029

http://dx.doi.org/10.1090/psapm/029/9880

http://www.ams.org/psapm/029

http://dx.doi.org/10.1090/psapm/029/9879

http://www.ams.org/psapm/029

http://dx.doi.org/10.1090/psapm/029/9878

http://www.ams.org/psapm/029

http://dx.doi.org/10.1090/psapm/029/9877

Access is restricted to licensed institutions

Electronic reproduction. Providence, Rhode Island : American Mathematical Society. 2012

Mode of access : World Wide Web

Description based on print version record.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha